Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Ongoing web shell attack compromises over 900 Sangoma FreePBX instances

Google and OpenAI employees support Anthropic’s Department of Defense position in open letter

Malicious Go crypto module steals passwords and deploys Rekoobe backdoor

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious Go crypto module steals passwords and deploys Rekoobe backdoor
Identity

Malicious Go crypto module steals passwords and deploys Rekoobe backdoor

userBy userFebruary 27, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 27, 2026Malware / Linux Security

Rekoobe backdoor

Cybersecurity researchers have revealed details of a malicious Go module designed to harvest passwords, create persistent access via SSH, and distribute a Linux backdoor named Rekoobe.

Go module, github[.]com/xinfeisoft/crypto impersonates the legitimate “golang.org/x/crypto” codebase, but injects malicious code into the remote endpoint that is responsible for leaking secrets entered via the terminal’s password prompt, and retrieves and executes shell scripts in response.

“This activity falls under namespace confusion and spoofing of the legitimate golang.org/x/crypto subrepository (and its GitHub mirror github.com/golang/crypto),” said socket security researcher Kirill Boychenko. “Legitimate projects identify go.googlesource.com/crypto as canonical and treat GitHub as a mirror. Threat actors exploit this distinction to routinely show github.com/xinfeisoft/crypto in their dependency graphs.”

Specifically, the backdoor is placed within the “ssh/terminal/terminal.go” file so that whenever the victim application calls ReadPassword(), a function whose purpose is to read input such as passwords from the terminal, that information is captured for interactive secrets.

The main role of the downloaded script is to act as a Linux stager, add the threat actor’s SSH keys to the ‘/home/ubuntu/.ssh/authorized_keys’ file, set the iptables default policy to ACCEPT to ease firewall restrictions, and retrieve additional payloads from external servers while disguising themselves with an .mp5 extension.

Of the two payloads, one is a helper that tests the internet connection and attempts to communicate with the IP address (‘154.84.63’).[.]Socket noted that the program would likely function as a scout or loader.

The second downloaded payload is believed to be Rekoobe, a known Linux Trojan that has been detected in the wild since at least 2015. This backdoor can receive commands from an attacker-controlled server to download further payloads, steal files, and execute a reverse shell. As of August 2023, Rekoobe was being used by Chinese nation-state groups like APT31.

The package is still listed on pkg.go.dev, but the Go security team has taken steps to block it as malicious.

“This campaign is likely to be repeated because it is low effort and high impact, with a similar module hooking the high bound (ReadPassword), using GitHub Raw as a rotation pointer, and then pivoting to curl | sh staging and Linux payload delivery,” Boychenko said.

“Defenders should anticipate similar supply chain attacks targeting other ‘credential edge’ libraries (SSH helpers, CLI authentication prompts, database connectors), as well as indirect attacks through hosting surfaces that rotate infrastructure without republishing code.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI raises $110 billion in largest private funding round in history
Next Article Google and OpenAI employees support Anthropic’s Department of Defense position in open letter
user
  • Website

Related Posts

Ongoing web shell attack compromises over 900 Sangoma FreePBX instances

February 27, 2026

ScarCruft uses Zoho WorkDrive and USB malware to infiltrate air-gapped networks

February 27, 2026

Trojanized gaming tool spreads Java-based RAT via browsers and chat platforms

February 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ongoing web shell attack compromises over 900 Sangoma FreePBX instances

Google and OpenAI employees support Anthropic’s Department of Defense position in open letter

Malicious Go crypto module steals passwords and deploys Rekoobe backdoor

OpenAI raises $110 billion in largest private funding round in history

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.